1994
DOI: 10.1007/3-540-58426-9_143
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical checking of multiprocessors using watchdog processors

Abstract: Abstract.A new control flow checking scheme, based on assigned-signature checking by a watchdog processor, is presented. This scheme is suitable for a multitasking, multiprocessor environment. The hardware overhead is comparatively low because of three reasons: first, hierarchically structured, the scheme uses only a single watchdog processor to monitor multiple processes or processors. Second, as an assigned-signature scheme it does not require monitoring the instruction bus of the processors. Third, the run-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

1999
1999
2010
2010

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Derived signatures were used together (i) with stored database in the Asynchronous Signatured Instruction Stream approach by Eifert et al [7], (ii) with watchdog program by Michel et al [8] and (iii) with embedded signatures in Path Signature Analysis approaches of Namjoo [9] Assigned signatures were used together (i) with stored database in the Extended Structural Integrity Checking approach by Michel and Hohl [10], (ii) with watchdog program in Lu's Structural Integrity Checking method [11] and (iii) with embedded signatures in the Signature Encoded Instruction Stream (SEIS) approach by Majzik et al [12].…”
Section: A Watchdog Architecture For Uml 20 Statechartsmentioning
confidence: 99%
“…Derived signatures were used together (i) with stored database in the Asynchronous Signatured Instruction Stream approach by Eifert et al [7], (ii) with watchdog program by Michel et al [8] and (iii) with embedded signatures in Path Signature Analysis approaches of Namjoo [9] Assigned signatures were used together (i) with stored database in the Extended Structural Integrity Checking approach by Michel and Hohl [10], (ii) with watchdog program in Lu's Structural Integrity Checking method [11] and (iii) with embedded signatures in the Signature Encoded Instruction Stream (SEIS) approach by Majzik et al [12].…”
Section: A Watchdog Architecture For Uml 20 Statechartsmentioning
confidence: 99%
“…When leaving a basic block, the signatures can be compared and errors inside the basic block can be found. Signature methods can be divided into two groups, namely embedded signature monitoring (ESM) [15]- [17] and autonomous signature monitoring (ASM) [18], [19].…”
Section: Related Workmentioning
confidence: 99%
“…Since the FPGA is programmable in run-time, both structures can be downloaded and evaluated. The fast compression algorithm and the low hardware overhead enable the circuit to be built into a conventional watchdog-processor unit [9].…”
Section: Measurement Resultsmentioning
confidence: 99%